
7 CONCLUSION
In this work, we have focussed on the technical as-
pects of data sovereignty and the requirements for
its implementation by a system. We evaluated the
relevance of selected system characteristics with the
help of an empirical study and structured the FRs
and NFRs derived from this using goal models. Af-
terwards, we discussed our findings and compared
them to related work. Overall, we have empha-
sised that data sovereignty is not achieved by imple-
menting a definite list of system features but through
a combination of use-case-specific functional and
non-functional requirements. As one participant in
the study summarised, “[m]odern systems will have
[d]ata [s]overeignty by design” (P17). While build-
ing on privacy and security, our work has taken a
step towards a targeted requirements analysis and rea-
soned system design by extending research on self-
determination and autonomy in industrial data sharing
with a more technically refined view.
ACKNOWLEDGEMENTS
This work was partially supported by the German
Federal Ministry for Economic Affairs and Climate
Action (funding number: 13IK004N). We thank
Daniel Tebernum for his valuable input and all par-
ticipants for contributing to our study.
REFERENCES
Biehs, S. and Stilling, J. (2024). Identification of Key Re-
quirements for the Application of Data Sovereignty in
the Context of Data Exchange. In Proceedings of the
57th Annual Hawaii International Conference on Sys-
tem Sciences. ScholarSpace.
Borchert, A. and Heisel, M. (2021). Conflict Identi-
fication and Resolution for Trust-Related Require-
ments Elicitation A Goal Modeling Approach. J.
Wirel. Mob. Networks Ubiquitous Comput. Depend-
able Appl., 12(1):111–131.
Brauner, P., Dalibor, M., Jarke, M., Kunze, I., Koren, I.,
Lakemeyer, G., Liebenberg, M., Michael, J., Pen-
nekamp, J., Quix, C., Rumpe, B., van der Aalst, W.,
Wehrle, K., Wortmann, A., and Ziefle, M. (2022). A
Computer Science Perspective on Digital Transforma-
tion in Production. ACM Trans. Internet Things, 3(2).
Dalpiaz, F., Franch, X., and Horkoff, J. (2016). iStar 2.0
Language Guide. CoRR.
Elahi, G. and Yu, E. (2007). A Goal Oriented Approach
for Modeling and Analyzing Security Trade-Offs. In
Proceedings of the 26th International Conference on
Conceptual Modeling, pages 375–390. Springer.
European Parliament and Council of the European Union
(2016). Regulation (EU) 2016/679 of the European
Parliament and of the Council.
Falc
˜
ao, R., Matar, R., Rauch, B., Elberzhager, F., and Koch,
M. (2023). A Reference Architecture for Enabling
Interoperability and Data Sovereignty in the Agricul-
tural Data Space. Information, 14(3):197.
Garousi, V., Felderer, M., and M
¨
antyl
¨
a, M. V. (2019).
Guidelines for including grey literature and conduct-
ing multivocal literature reviews in software engineer-
ing. Information and Software Technology, 106:101–
121.
Grootendorst, M. (2020). KeyBERT: Minimal keyword ex-
traction with BERT.
Hansen, M., Jensen, M., and Rost, M. (2015). Protection
Goals for Privacy Engineering. In 2015 IEEE Security
and Privacy Workshops. IEEE Computer Society.
Hellmeier, M., Pampus, J., Qarawlus, H., and Howar, F.
(2023). Implementing Data Sovereignty: Require-
ments & Challenges from Practice. In Proceedings
of the 18th International Conference on Availability,
Reliability and Security. ACM.
Hellmeier, M. and von Scherenberg, F. (2023). A Delimita-
tion of Data Sovereignty from Digital and Technolog-
ical Sovereignty. In Proceedings of the 31st European
Conference on Information Systems.
International Organization for Standardization (2011).
ISO/IEC 25010:2011, Systems and software engineer-
ing, Systems and software Quality Requirements and
Evaluation (SQuaRE), System and software quality
models. Standard.
Jarke, M., Otto, B., and Ram, S. (2019). Data Sovereignty
and Data Space Ecosystems. Business & Information
Systems Engineering, 61(5):549–550.
Krosnick, J. A. (2018). Questionnaire Design. In The Pal-
grave Handbook of Survey Research. Springer Inter-
national Publishing.
Larrinaga, F. et al. (2022). Data Sovereignty - Requirements
Analysis of Manufacturing Use Cases.
Opriel, S., M
¨
oller, F., Burkhardt, U., and Otto, B. (2021).
Requirements for Usage Control based Exchange of
Sensitive Data in Automotive Supply Chains. In Pro-
ceedings of the 54th Hawaii International Conference
on System Sciences.
Peixoto, M. M. and Silva, C. (2018). Specifying privacy
requirements with goal-oriented modeling languages.
In Proceedings of the XXXII Brazilian Symposium on
Software Engineering. ACM.
von Scherenberg, F., Hellmeier, M., and Otto, B. (2024).
Data Sovereignty in Information Systems. Electronic
Markets, 34(1):1–11.
Wilkinson, M. D. et al. (2016). The FAIR Guiding Princi-
ples for scientific data management and stewardship.
Scientific Data, 3(1):1–9.
Zrenner, J., M
¨
oller, F. O., Jung, C., Eitel, A., and Otto, B.
(2019). Usage control architecture options for data
sovereignty in business ecosystems. Journal of Enter-
prise Information Management, 32(3):477–495.
ICSOFT 2024 - 19th International Conference on Software Technologies
122